Difference between revisions of "Kernel bugs"
Jump to navigation
Jump to search
Line 104: | Line 104: | ||
| 20180504 | | 20180504 | ||
| [https://www.spinics.net/lists/linux-mm/msg151667.html Re: mm: access to uninitialized struct page] | | [https://www.spinics.net/lists/linux-mm/msg151667.html Re: mm: access to uninitialized struct page] | ||
+ | |- | ||
+ | | 20180606 | ||
+ | | [https://www.spinics.net/lists/netdev/msg507122.html net: do not allow changing SO_REUSEADDR/SO_REUSEPORT on bound sockets] | ||
|} | |} | ||
Revision as of 03:40, 9 June 2018
We have implemented Continuous integration#Kernel testing to check if any recent kernel changes break CRIU, to catch those before they appear in the vanilla kernel. This article documents Linux kernel bugs found using this method.
Found bugs
Note that the list is probably incomplete; there were a few bugs found and fixed before we cared to document it here.